General
-
Target
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a
-
Size
695KB
-
Sample
230327-x132lseh68
-
MD5
e28ca4dbf89ec2417e4e6d177147fc84
-
SHA1
5f0c23f0dd62c926ff7b8dfcece4ed5f2b9317d1
-
SHA256
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a
-
SHA512
92136ebf9a0743902551437a28d23fa27697affd2f5a8836e4d3c138d918d007b8c93d67bb5411272d5736a3ba32f015ff8a88bfc4c3ad90181780e7f41ff96b
-
SSDEEP
12288:BMr7y90TfNx4Mwrbqa1UWfQq5AMylytMeO47k+vyZvzNr9JcXjx5:iyClehvbsMylyueN7TvqNxejx5
Static task
static1
Behavioral task
behavioral1
Sample
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Targets
-
-
Target
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a
-
Size
695KB
-
MD5
e28ca4dbf89ec2417e4e6d177147fc84
-
SHA1
5f0c23f0dd62c926ff7b8dfcece4ed5f2b9317d1
-
SHA256
404ca2b2dd319a0ad8230285b16e4054f754188c3b1bf3a0ecce7de031b4b76a
-
SHA512
92136ebf9a0743902551437a28d23fa27697affd2f5a8836e4d3c138d918d007b8c93d67bb5411272d5736a3ba32f015ff8a88bfc4c3ad90181780e7f41ff96b
-
SSDEEP
12288:BMr7y90TfNx4Mwrbqa1UWfQq5AMylytMeO47k+vyZvzNr9JcXjx5:iyClehvbsMylyueN7TvqNxejx5
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-